The ACM Computing Classification System (1998) K.6.5 Security and Protection Authentication Insurance [**] Invasive software (e.g., viruses, worms, Trojan horses) Physical security [**] Unauthorized access (e.g., hacking, phreaking)